General

  • Target

    4ccf1e6e209c5906bf47395905ed2c0853b040062bf99646cea18f5497126fad

  • Size

    41KB

  • Sample

    240919-z6w7cs1drf

  • MD5

    a21ee512d536fd054e8a3bde5f264245

  • SHA1

    e7bb5f51dd003530b25a01f8970d46df7e6eec66

  • SHA256

    4ccf1e6e209c5906bf47395905ed2c0853b040062bf99646cea18f5497126fad

  • SHA512

    bcb7fd75a04f655d25549659ecac9149d8d4e23b8c5c64c197271bb9ab9d927f4051dce2fbb8fab4f155e3bd73af18c481b3aa5c8ce64767a5a240a0280e6652

  • SSDEEP

    384:JL9Y9t9t9JCiSwvxjk+tqfQ8u/gSg2Zh8g0jqD+pe4Z1h1Lt4/:99Y9t9t9Jlxw+tZ8u/lLRdD+pxZr

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://192.168.45.248:443/2jeE7Veqh-2uja-MyGH8IQ-t_yn4gmI7PHEb4CGHHCxlu3mKEdzPGyaGyAVIeF2xcN2q419YEF6FzEyjbUvKn_v1XKLCOJSwaUWCUEIFFXgdZeYGtj0RVz3uGyAf1Sj0jNh6gkyOzIr_UuCNs0nzkDVwgg1D86iX_V1uy7S1Y8tJQ2EQHtpESXdP8LkJrDXtSk-NXhchTQhSQV14Bh4WBJ-CpyEZUMojWPF7RALF1p3mfWf-PaOeLp

Targets

    • Target

      4ccf1e6e209c5906bf47395905ed2c0853b040062bf99646cea18f5497126fad

    • Size

      41KB

    • MD5

      a21ee512d536fd054e8a3bde5f264245

    • SHA1

      e7bb5f51dd003530b25a01f8970d46df7e6eec66

    • SHA256

      4ccf1e6e209c5906bf47395905ed2c0853b040062bf99646cea18f5497126fad

    • SHA512

      bcb7fd75a04f655d25549659ecac9149d8d4e23b8c5c64c197271bb9ab9d927f4051dce2fbb8fab4f155e3bd73af18c481b3aa5c8ce64767a5a240a0280e6652

    • SSDEEP

      384:JL9Y9t9t9JCiSwvxjk+tqfQ8u/gSg2Zh8g0jqD+pe4Z1h1Lt4/:99Y9t9t9Jlxw+tZ8u/lLRdD+pxZr

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks